Glossary Of Technical Terms

Ethernet Cable Max Distance, Ethernet cable length

Glossary Of Technical Terms

► 802.1Q VLAN Support

802.1q tagged VLANs are supported for traffic segmentation as well as client identification. Individual device ports mapped into VLANs can be used as method for identification for portal segmentation and billing purposes. All 4096 VLAN IDs are supported in the implementation, and they use VLAN types to determine traffic handling.

► Access Point

A device that allows users with wireless access to connect to a wireless network.

► ARP Exclusions

A list of valid devices IP addresses present on the network(s). When network device sees an ARP (known IP address, unknown MAC address) for one of the devices that do not respond because there is a device on the network, it will legitimately respond. Add to the ARP exclusion list non-client, IP-based network devices that share a common layer 2 environment with the network device. The IP addressing used by these devices should not be part of the Subscriber Network or DHCP scope.

► ARP Table

Table that displays current active ARP entries on the device.

► Bandwidth

The maximum amount of data that can travel a communications path in a given time, usually measured in seconds.

► Blonder Tongue Megaport Port Mapping

Identical in function to SNMP RFC 1493 Port mapping except for the SNMP query sent to the network device. Instead of RFC 1493 based implementation, a proprietary enterprise MIB is queried to extract the port information.

► Broadcast Domain

A logical area in a computer network where any computer connected to the computer network can directly transmit to any other in the domain without having to go through a routing device.

► CLI

A command line interface.

► CMTS DHCP

CMTS DHCP Scope configuration is specifically for configuring DHCP services for cable modems.

► Collision Domain

Logical area in a computer network where data packets can “collide” with one another.

► Configuration Backup

A utility that allows for retrieval of the entire device’s configuration via a text file. The text file can be copied out of the device for purposes of backup or configuration automation.

► Configuration Restore

A utility that allows for uploading an entire device’s configuration via a text file. The text file can be imported in whole or specific lines can be manipulated.

► CSV (Comma-Separated Values)

A file format that has fields separated by a comma.

► Destination IP

The target IP address or network where the data is moving towards.

► Devices

Managed or unmanaged network devices (routers, switches, modems, etc.).

► DHCP (Dynamic Host Configuration Protocol)

Communications protocol that lets network administrators manage centrally and automate the assignment of Internet Protocol (IP) addresses in an organization’s network.

► DHCP Lease Table

Displays the current active DHCP leases.

► DHCP Leases

Leases based upon product or account duration.

► DHCP Server

A server in a network or Internet service that assigns IP addresses to the multiple stations on the network.

► DHCP Temp Lease

Temporary DHCP Leases that are used to modify DHCP assignments to subscribers as needed for product based functionality. The temporary lease time is configurable and only applicable to non-active subscribers. (Users not listed as active in the billing table.)

► Disable NAT

Global NAT disablement allows for configuring routable IP addresses into the DHCP scope and overriding any NAT product type to route the client IP addresses with no translation.

► DNS Server (Domain Name Service)

A server used to translate between domain names and IP addresses. DNS servers translate names, such as xyz.com, into the numeric IP address that the Internet uses to send and receive information.

► Dynamic DNS

A process of performing a DNS Update to add, modify, or delete DNS resource records on the dynamically without reloading the entire DNS zone master file.

► Export Billing Data to CSV

Data in the billing table can be downloaded from the device in the form of a comma separated values (CSV) file for purposes of integration into an external system or application.

► External Proxy

Support users configure to redirect all HTTP based traffic to an upstream proxy server IP address and port. Used in situations where all Internet access is forced through proxy servers.

► External Redirect

A configuration to redirect (via HTTP) a client’s post authentication to a desired URL.

► Firewall Access List

Provides a traffic filter on the inside, outside, specific VLAN(s) or all VLANS (VLAN+) interfaces.

► FTP (File Transfer Protocol)

A very common method of transferring one or more files.

► Generic Redirect Method

A generic XML connector for pre and post redirect options.

► Host Name

Textual name given to the Network Device device.

► HTTP (hyper text transport protocol)

Underlying protocol that defines how messages are formatted and transmitted, and what actions Web servers and browsers would take in response to various commands.

► HTTPS (hyper text transport protocol, secure)

Underlying protocol designed to transmit individual messages securely over the World Wide Web (www).

► Hub

A commonly used device for connecting multiple computers or segments of a LAN together.

► ICMP (Internet control message protocol)

Extension to the IP defined by RFC 792. Supports packets containing error, control, and informational messages.

► ICMP Utilities

Utility to provide ICMP ping and trace route functionality. This functionality is applicable both upstream and downstream of the device.

► Idle-Timeout

Determines if an access account/code can be utilized more than one time. When the idle timeout is disabled, the account/code until the duration expires. If the idle timeout is enabled and a user is idled out of the system, the remaining (unused) time attributed to the account/code will be available for re-use by the subscriber. The account/code will be able to be used for sign up purposes until it is such that all available time on the account/code has been used. Once an account/code has no duration available to it the account/code cannot be used for sign up purposes again.

► Inbound

The traffic direction with respect to the selected interface. Any traffic moving towards the respective Interface.

► Inside Interface

The destination interface for all Subscriber LAN traffic. Subscriber LAN traffic is routed via the inside interface before reaching its targeted destination on the WAN or Subscriber LAN.

► Interface Display

A utility that shows all interfaces to a device (both physical and virtual). Displays packet and error counters for each listed interface.

► Internal Redirect

Internal redirection is configured to redirect (via HTTP) a client’s post authentication to a desired HTML file internal to the Network Device network.

► LDAP Authentication

LDAP Authentication will allow for authorization of clients by the device via an external LDAP server.

► Local Authentication

Local Authentication is a local list of usernames and passwords used for the purposes of authentication. There is no limit to the number of local authentication accounts that can be created.

► LRE

Long Range Ethernet – Technology used to extender the reach of standard 802.3 Ethernet beyond 328ft or 100m.

► MAC Address

A hardware address of a device.

► MAC Filter

A configurable list of MAC addresses that specifically allows or denies access through the unit.

► Management Interface

A default VLAN which encompasses non-subscriber traffic such as managed network devices. Non-Subscriber devices must be configured on a management IP subnet, with the configured gateway and subnet listed as the secondary inside interface, to allow for layer 3 route propagation.

► NAT (Network Address Translation)

Identical in function to SNMP RFC 1493 Port mapping except for the SNMP query sent to the network device. Instead of RFC 1493 based implementation, a proprietary enterprise MIB is queried to extract the port information.

► Outbound

The traffic direction with respect to the selected interface. Any traffic moving away from the respective interface.

► PAT (Port Address Translation)

A type of network address translation which allows LAN users to keep their IP address private when communicating via the internet.

► Ping (packet Internet groper)

Program used to test reachability of destinations by sending them an ICMP echo request and waiting for a reply.

► Port Bindings

IP Port Bindings are used for managing devices on the internal (inside) network of the Network Device from the external (outside) network. TCP or UDP ports can be exported from the public IP address and mapped to any internal IP address and port.

► Port Name

Descriptive fields used for display purposes in the billing table. Any information configured in this field is displayed in the port column in all billing tables.

► Port(s)

Port numbers represent an endpoint, or channel, for network communications. Port numbers allow different applications on the same computer to utilize network resources without interfering with each other. They are also a conduit for internet viruses to propagate from one device to another. In IP networking, port numbers can theoretically range from 0 to 65535.

► Portal Groups

Portal Groups associate various configuration elements for the purposes of presentation and limitation to what clients of the system can see or use.

► Prefix Code

A 3 character (alpha only) prefix to the 6 digit authentication code that is generated. This allows administrators of the system to identify the type of code by the prefix.

► Public IP

A WAN IP required to be configured on the Network Device for routed IP layer access.

► Routable IP

A product type that assigns public (non-NAT’d) IP addresses to those clients that select a product with this IP type. The assignment happens via DHCP and requires the use of a temporary DHCP lease.

► Router

A device that forwards packets from one network to another based on addressing information.

► Routing Table

Displays the current routing table of the device with a mechanism to delete non-critical system routes.

► SMTP (Simple Mail Transfer Protocol)

A format for sending e-mail messages between servers.

► SMTP Filter

SMTP filter is configured to limit the number of messages a particular client can send over the specified duration of time.

► SMTP Mail Relay

A process of a system contacting a Mail Host to send mail to other systems using the standard mail protocols.

► SNMP (Simple Network Management Protocol)

A set of protocols used to manage networks.

► SNMP Allowed Networks

Allowed SNMP based network source.

► SNMP Read Only Community

Read only based SNMP community string.

► SNMP RFC 1493 Port Mapping

SNMP Port Mapping functionality exists to have a mechanism to query network devices in a standard method with the MAC address of a client for the purposes of determining their location on the network.

► Source IP

The IP address or node on a network from where the data originates from.

► Standard NAT

PAT (Port Address Translation) mapping from the client’s IP address to the public (Outside) IP address of the device.

► Static IP

The IP address remains fixed and unique after each login.

► Static IP Mappings

Static IP mapping is a one to one mapping from the client’s IP address to a public IP address configured in the Static IP table. Also applicable to local static IP assignments on network devices.

► Subnet Mask prefix

Used to determine what subnet an IP address resides within. The mask is the specified network hosts corresponding to the IP address.

► Switch

A device that filters and forwards packets through the network.

► TCP (Transmission Control Protocol)

Protocol designed to interconnect a variety of computer equipment.

► TFTP File Manager

Utility allows for uploading files that will be available for retrieval via the device’s TFTP server. Files can be deleted from this manager as well.

► Trace route

utility that enables users to send and trace a packet to an Internet host to determine the route the packet takes.

► Transparent Proxy

Transparent proxy support is implemented to provide HTTP based proxy services for those clients configured for proxy.

► UDP (User Datagram Protocol)

Connectionless transport protocol that runs on top of TCP.

► Update Firmware

Utility allows for updating the firmware on the device. The firmware is downloaded via a FTP server into the device. The md5sum for the file must be supplied at the time of the download. The downloaded file will have an md5sum generated locally on the device and then compared to the supplied md5sum for verification of file validity.

► VLAN Interface

Destination interface for all Subscriber LAN traffic originating from that specific VLAN.

► VLAN Security

Allows or disallows communications between users on different VLANs. When this feature is disabled clients are able to pass traffic with one another as if it was a flat network. When enabled no VLAN to VLAN routing of traffic is allowed, preventing any client in a VLAN communicating with a client in a different VLAN.

► VLAN+

Selection to denote all configured VLANs.

► VLAN

A Logical representation of a traditional LAN sharing all of the characteristics of a LAN without the physical restrictions. It allows having hosts in disparate physical locations to be in the same VLAN segment and share their broadcast domain and provide direct IP connectivity.

► Walled Garden

A list of IP Address and/or domains that clients of the device have access without any authorization or redirection required. These entries can be in IP address form or fully qualified domain name form. A subnet field is configurable for denoting whether access to a single IP address or a subnet is allowed.

► WebAdmin

Network Device Web Administration interface.

► Wireless Cookie Roaming

Allows for the storage of a cookie on the client machine’s browser for the purposes of identification in the event of a MAC address change. This identification allows for allowing the client access without re-authenticating through the portal.

► WWW (World Wide Web)

A collection of Internet servers consisting of billions of documents with hyperlinks to other documents.

► XML Billing Data

Want A Free Custom Design Consultation?

We Are More Than Happy to Listen To Your Specific Project Needs.

Enable-IT Guarantees Your e-Mail Privacy 100%

Your Information Is Never Shared Or Sold.

Request for Quote From Distributors

Request for Discount Quote